skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Editors contains: "Yang, Hui"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Wang, Yan; Yang, Hui (Ed.)
    Abstract The scarcity of measured data for defect identification often challenges the development and certification of additive manufacturing processes. Knowledge transfer and sharing have become emerging solutions to small-data challenges in quality control to improve machine learning with limited data, but this strategy raises concerns regarding privacy protection. Existing zero-shot learning and federated learning methods are insufficient to represent, select, and mask data to share and control privacy loss quantification. This study integrates differential privacy in cybersecurity with federated learning to investigate sharing strategies of manufacturing defect ontology. The method first proposes using multilevel attributes masked by noise in defect ontology as the sharing data structure to characterize manufacturing defects. Information leaks due to the sharing of ontology branches and data are estimated by epsilon differential privacy (DP). Under federated learning, the proposed method optimizes sharing defect ontology and image data strategies to improve zero-shot defect classification given privacy budget limits. The proposed framework includes (1) developing a sharing strategy based on multilevel attributes in defect ontology with controllable privacy leaks, (2) optimizing joint decisions in differential privacy, zero-shot defect classification, and federated learning, and (3) developing a two-stage algorithm to solve the joint optimization, combining stochastic gradient descent search for classification models and an evolutionary algorithm for exploring data-sharing strategies. A case study on zero-shot learning of additive manufacturing defects demonstrated the effectiveness of the proposed method in data-sharing strategies, such as ontology sharing, defect classification, and cloud information use. 
    more » « less
    Free, publicly-accessible full text available November 7, 2025
  2. Yang-Hui He, Mo-Lin Ge (Ed.)
  3. He, Yang-Hui; Ge, Mo-Lin; Bai, Cheng-Ming; Bao, Jiakang; Hirst, Edward (Ed.)
    We provide an overview of recent work which aims to understand patterns of vanishing Yukawa couplings that arise in models of particle physics derived from string theory. These patterns are seemingly linked to a plethora of different geometrical structures and our understanding of the subject has yet to be consolidated in a unified framework. This short note is based upon a talk that was given by one of the authors at the Nankai Symposium on Mathematical Dialogues. Therefore it is aimed at a mathematical audience of mixed academic background. 
    more » « less
  4. He, Yang-Hui; Ge, Mo-Lin; Bai, Cheng-Ming; Bao Jiakang; Hirst, Edward (Ed.)
    Vector bundle cohomology represents a key ingredient for string phenomenology, being associated with the massless spectrum arising in string compactifications on smooth compact manifolds. Although standard algorithmic techniques exist for performing cohomology calculations, they are laborious and ill-suited for scanning over large sets of string compactifications to find those most relevant to particle physics. In this article we review some recent progress in deriving closed-form expressions for line bundle cohomology and discuss some applications to string phenomenology. 
    more » « less